Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/4304
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShah, Pankil R.-
dc.date.accessioned2013-12-20T07:14:43Z-
dc.date.available2013-12-20T07:14:43Z-
dc.date.issued2013-06-01-
dc.identifier.urihttp://10.1.7.181:1900/jspui/123456789/4304-
dc.description.abstractIn todays scenario, attacks on intel products have been increasing and there is an ever increasing need to make intel products more secure. For overall safety of the intel platforms, BIOS should be secure and stable. If BIOS is corrupted then the intel platforms will have a permanent denial of service or ine cient/unlikely behav- ior. Therefore the main objective of the BIOSs security is to protect itself and its di erent interfaces from malicious attacks. So, security development lifecycle helps to ensure BIOS security. The security development lifecycle is a set of activities which extend the intel platform's security and privacy requirements. This ensures that products are designed, implemented and validated with an appropriate level of BIOS security in mind.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries11MECC14en_US
dc.subjectEC 2011en_US
dc.subjectProject Reporten_US
dc.subjectProject Report 2011en_US
dc.subjectEC Project Reporten_US
dc.subjectEC (Communication)en_US
dc.subjectCommunicationen_US
dc.subjectCommunication 2011en_US
dc.subject11MECCen_US
dc.subject11MECC14en_US
dc.titleSecurity Development Lifecycle Based BIOS Security Validationen_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, EC (Communication)

Files in This Item:
File Description SizeFormat 
11MECC14.pdf11MECC142.54 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.